{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:58:46Z","timestamp":1767891526634,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030948993","type":"print"},{"value":"9783030949006","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94900-6_4","type":"book-chapter","created":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T08:03:48Z","timestamp":1642579428000},"page":"73-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["End to\u00a0End Autorship Email Verification Framework for\u00a0a\u00a0Secure Communication"],"prefix":"10.1007","author":[{"given":"Giacomo","family":"Giorgi","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,19]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Brocardo, M.L., Traore, I., Saad, S., Woungang, I.: Authorship verification for short messages using stylometry. In: 2013 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/CITS.2013.6705711"},{"issue":"8","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1016\/j.jcss.2014.12.019","volume":"81","author":"ML Brocardo","year":"2015","unstructured":"Brocardo, M.L., Traore, I., Woungang, I.: Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 81(8), 1429\u20131440 (2015)","journal-title":"J. Comput. Syst. Sci."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-642-23199-5_28","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"X Chen","year":"2011","unstructured":"Chen, X., Hao, P., Chandramouli, R., Subbalakshmi, K.P.: Authorship similarity detection from email messages. In: Perner, P. (ed.) MLDM 2011. LNCS (LNAI), vol. 6871, pp. 375\u2013386. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23199-5_28"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/72.279188","volume":"5","author":"JT Connor","year":"1994","unstructured":"Connor, J.T., Martin, R.D., Atlas, L.E.: Recurrent neural networks and robust time series prediction. IEEE Trans. Neural Netw. 5(2), 240\u2013254 (1994)","journal-title":"IEEE Trans. Neural Netw."},{"key":"4_CR5","unstructured":"Dasarathy, B.V.: Nearest neighbor (NN) norms: NN pattern classification techniques. IEEE Computer Society Tutorial (1991)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Dewan, P., Kashyap, A., Kumaraguru, P.: Analyzing social and stylometric features to identify spear phishing emails. In: 2014 APWG Symposium on Electronic Crime Research (ecrime), pp. 1\u201313. IEEE (2014)","DOI":"10.1109\/ECRIME.2014.6963160"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Donahue, J., et al.: Long-term recurrent convolutional networks for visual recognition and description. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2625\u20132634 (2015)","DOI":"10.1109\/CVPR.2015.7298878"},{"issue":"771\u2013780","key":"4_CR8","first-page":"1612","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund, Y., Schapire, R., Abe, N.: A short introduction to boosting. J. Japanese Soc. Artif. Intell. 14(771\u2013780), 1612 (1999)","journal-title":"J. Japanese Soc. Artif. Intell."},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Giorgi, G., Saracino, A., Martinelli, F.: Email spoofing attack detection through an end to end authorship attribution system. In: Furnell, S., Mori, P., Weippl, E.R., Camp, O. (eds.) Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25\u201327, 2020. pp. 64\u201374. SCITEPRESS (2020). https:\/\/doi.org\/10.5220\/0008954600640074","DOI":"10.5220\/0008954600640074"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A.r., Hinton, G.: Speech recognition with deep recurrent neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6645\u20136649. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"4_CR11","unstructured":"Guenther, M.: Social engineering-security awareness series. Information Warfare site UK online. http:\/\/www.iwar.org.uk\/comsec\/resources\/sa-tools\/social-engineering.pdf. Accessed 20 Dec 2006"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.24846\/v22i1y201307","volume":"22","author":"IRA Hamid","year":"2013","unstructured":"Hamid, I.R.A., Abawajy, J., Kim, T.: Using feature selection and classification scheme for automating phishing email detection. Stud. Inf. Contr. 22(1), 61\u201370 (2013)","journal-title":"Stud. Inf. Contr."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Han, Y., Shen, Y.: Accurate spear phishing campaign attribution and early detection. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 2079\u20132086 (2016)","DOI":"10.1145\/2851613.2851801"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278\u2013282. IEEE (1995)","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Jakobsson, M.: Modeling and preventing phishing attacks. In: Financial Cryptography, vol. 5 (2005)","DOI":"10.1007\/11507840_9"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1214\/aoms\/1177729392","volume":"23","author":"J Kiefer","year":"1952","unstructured":"Kiefer, J., Wolfowitz, J., et al.: Stochastic estimation of the maximum of a regression function. Ann. Math. Stat. 23(3), 462\u2013466 (1952)","journal-title":"Ann. Math. Stat."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-30115-8_22","volume-title":"Machine Learning: ECML 2004","author":"B Klimt","year":"2004","unstructured":"Klimt, B., Yang, Y.: The enron corpus: a new dataset for email classification research. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol. 3201, pp. 217\u2013226. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30115-8_22"},{"key":"4_CR18","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-030-11680-4_14","volume-title":"Information Management and Big Data","author":"M Litvak","year":"2019","unstructured":"Litvak, M.: Deep dive into authorship verification of email messages with convolutional neural network. In: Lossio-Ventura, J.A., Mu\u00f1ante, D., Alatrista-Salas, H. (eds.) SIMBig 2018. CCIS, vol. 898, pp. 129\u2013136. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11680-4_14"},{"key":"4_CR19","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00220670209598786","volume":"96","author":"CYJ Peng","year":"2002","unstructured":"Peng, C.Y.J., Lee, K.L., Ingersoll, G.M.: An introduction to logistic regression analysis and reporting. J. Educ. Res. 96(1), 3\u201314 (2002)","journal-title":"J. Educ. Res."},{"issue":"1","key":"4_CR21","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"4_CR22","unstructured":"Ruder, S., Ghaffari, P., Breslin, J.G.: Character-level and multi-channel convolutional neural networks for large-scale authorship attribution. arXiv preprint arXiv:1609.06686 (2016)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, markov chains and author unmasking: An investigation. In: Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, pp. 482\u2013491. Association for Computational Linguistics (2006)","DOI":"10.3115\/1610075.1610142"},{"issue":"11","key":"4_CR24","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Sig. Process. 45(11), 2673\u20132681 (1997)","journal-title":"IEEE Trans. Sig. Process."},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Shrestha, P., Sierra, S., Gonzalez, F., Montes, M., Rosso, P., Solorio, T.: Convolutional neural networks for authorship attribution of short texts. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, vol. 2, pp. 669\u2013674 (2017)","DOI":"10.18653\/v1\/E17-2106"},{"issue":"3","key":"4_CR26","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JA Suykens","year":"1999","unstructured":"Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural Process. Lett. 9(3), 293\u2013300 (1999)","journal-title":"Neural Process. Lett."},{"key":"4_CR27","unstructured":"Zhang, X., Zhao, J., LeCun, Y.: Character-level convolutional networks for text classification. In: Advances in neural information processing systems, pp. 649\u2013657 (2015)"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing-style features and classification techniques. J. Amer. Soc. Inf. Sci. Technol. 57(3), 378\u2013393 (2006)","journal-title":"J. Amer. Soc. Inf. Sci. Technol."}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94900-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T15:36:38Z","timestamp":1726500998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94900-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030948993","9783030949006"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94900-6_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icissp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icissp.org\/?y=2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"125","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}